US20190354606A1 - Private Cryptocoinage in Blockchain Environments - Google Patents
Private Cryptocoinage in Blockchain Environments Download PDFInfo
- Publication number
- US20190354606A1 US20190354606A1 US15/983,572 US201815983572A US2019354606A1 US 20190354606 A1 US20190354606 A1 US 20190354606A1 US 201815983572 A US201815983572 A US 201815983572A US 2019354606 A1 US2019354606 A1 US 2019354606A1
- Authority
- US
- United States
- Prior art keywords
- private
- blockchain
- cryptocoinage
- entity
- data layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G06F17/30185—
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1805—Append-only file systems, e.g. using logs or journals to store data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G06F17/30283—
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H04L2209/38—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- FIGS. 1-8 are simplified illustrations of entity-based cryptographic coinage, according to exemplary embodiments
- FIGS. 9-11 are detailed illustrations of an operating environment, according to exemplary embodiments.
- FIGS. 12-16 illustrate a blockchain data layer, according to exemplary embodiments
- FIGS. 17-19 illustrate a single cryptographic address, according to exemplary embodiments
- FIGS. 20-22 illustrate a filling station, according to exemplary embodiments
- FIG. 23 illustrates a public entity, according to exemplary embodiments
- FIG. 24 is a flowchart illustrating a method or algorithm for the private, entity based cryptocoinage, according to exemplary embodiments.
- FIGS. 25-26 depict still more operating environments for additional aspects of the exemplary embodiments.
- first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first device could be termed a second device, and, similarly, a second device could be termed a first device without departing from the teachings of the disclosure.
- FIGS. 1-8 are simplified illustrations of entity-based cryptographic coinage 20 , according to exemplary embodiments.
- any entity 22 may create its own cryptographic coinage 20 in a blockchain environment 24 .
- the entity 22 in other words, may establish entity-specific electronic tokens 26 to access and/or to use the blockchain environment 24 .
- exemplary embodiments may be applied to any entity 22 , most readers are thought familiar with financial services. That is, suppose the entity 22 is a bank, lender, or other financial institution 28 (such as PIMCO®, CITI®, or BANK OF AMERICA®). As the reader likely understands, the financial institution 28 creates a massive amount of banking records, transaction records, mortgage instruments, and other private data 30 .
- FIG. 1 illustrates a private blockchain 34 . That is, the financial institution 28 cryptographically hashes the private data 30 into the private blockchain 34 and sends or feeds the private blockchain 34 to a blockchain data layer 36 .
- the blockchain data layer 36 generates various data records 38 , as later paragraphs will explain.
- the blockchain data layer 36 may also add another layer of cryptographic hashing to generate a public blockchain 40 .
- the blockchain data layer 36 acts as a validation service 42 and generates a cryptographic proof 44 .
- the public blockchain 40 thus publishes the cryptographic proof 44 as a public ledger 46 that establishes chains of blocks of immutable evidence.
- the entity-specific tokens 26 are associated with the entity 22 .
- the financial institution 28 for example, generates and/or issues the entity-specific tokens 26 to access the private blockchain 34 .
- the private blockchain 34 represents hashes of the financial institution's private data 30
- the private blockchain 34 may be considered a private resource or property of the financial institution 28 . That is, the private blockchain 34 is controlled by, or affiliated with, the financial institution 28 , so the financial institution 28 may control who adds and/or writes to the private blockchain 34 and who reads, accesses, or receives the private blockchain 34 .
- the entity-specific tokens 26 may thus be control mechanisms. While the entity-specific tokens 26 may have any functional scheme, FIG. 1 illustrates a private credit token 50 and a private tradeable token 52 .
- the entity's credit token 50 may be acquired and then spent or burned when accessing the financial institution's private blockchain 34 .
- the entity's credit token 50 in other words, represents any credit-based entry system associated with the financial institution's private blockchain 34 .
- the tradeable token 52 may be generated for transfer among others.
- the entity 22 generates the tradeable token 52 to be traded and/or spent.
- the tradeable token 52 in other words, may be considered as the entity's specific, private currency to be used as the entity 22 governs.
- FIGS. 2-3 illustrate examples of the entity-specific tokens 26 .
- a third-party 60 wishes to receive, read, write to, or otherwise access the financial institution's private blockchain 34 .
- exemplary embodiments may require that the third-party 60 spend or burn one or more of the credit tokens 50 .
- the credit token 50 may thus control access to the financial institution's private blockchain 34 .
- vendors, service providers, individual users, and other third-parties 60 may wish to access the hash values of the private data 30 contained within the financial institution's private blockchain 34 .
- the financial institution 28 may thus require that the third-party 60 redeem the entity's credit token(s) 50 before granting read, write, or access permission.
- the financial institution 28 may additionally or alternatively require redemption of the entity's credit token(s) 50 for using protocols, rules, and application programming interfaces (“APIs”) associated with the private blockchain 34 .
- the financial institution 28 may thus establish or issue its own credit tokens 50 and even govern their usage restrictions 62 and value 64 , as later paragraphs will explain.
- FIG. 3 illustrates the tradeable token 52 .
- the financial institution 28 may establish the tradeable token 52 and also govern its usage restrictions 62 and value 64 .
- the tradeable token 52 in other words, is a cryptocurrency or “coin.”
- the tradeable token 52 may be earned. That is, anyone (such as the third party 60 ) may earn the tradeable token 52 according to the usage restrictions 62 .
- the blockchain data layer 36 earns the entity's tradeable token(s) 52 in exchange for the validation service 42 . That is, a provider of the validation service 42 is paid, or earns, the entity's tradeable token(s) 52 for cryptographically hashing the proof 44 .
- the provider of the validation service 42 may also be paid in the entity's tradeable token(s) 52 for publishing the proof 44 .
- the tradeable token 52 may thus be transferred as currency according to the usage restrictions 62 and its value 64 .
- FIG. 4 illustrates transaction records 70 .
- the transaction record 70 may be generated.
- the transaction record 70 may then be documented in the blockchain environment 24 .
- the entity-specific tokens 26 may be addressable. That is, the credit token 50 and the tradeable token 52 may be uniquely associated with a common, single cryptographic address 72 .
- the cryptographic address 72 may represent an owner or holder (e.g., the entity 22 or the third-party 60 ).
- the entity-specific tokens 26 may be assigned or associated with the cryptographic address 72 .
- the cryptographic address 72 may then be received by, and propagated within, the blockchain data layer 36 to identify the corresponding data records 38 .
- the blockchain data layer 36 may even hash the cryptographic address 72 as the cryptographic proof 44 of the transaction records 70 . Exemplary embodiments thus publically document the transaction records 70 involving the entity-specific tokens 26 , based on the single cryptographic address 72 . In simple words, the blockchain data layer 36 publishes ownership and transfer proofs 44 of the credit token 50 and the tradeable token 52 based on the transaction records 70 associated with the single cryptographic address 72 .
- FIG. 5 illustrates a filling station 80 in the blockchain environment 24 .
- the filling station 80 allows the third party 60 to replenish or fill an account 82 .
- the third-party entity 22 may be required to spend the credit tokens 26 to access the financial institution's private blockchain 34 .
- the third-party entity 22 may thus establish the account 82 and maintain a monetary or numerical balance 84 of the entity's credit tokens 26 .
- the account 82 may need filling to continue using or accessing the financial institution's private blockchain 34 .
- the filling station 80 may access both the entity's transaction records 70 and the blockchain data layer 36 . Because the blockchain data layer 36 may document the data records 38 using the single cryptographic address 72 , the single cryptographic address 72 may serve as a common reference or query parameter with the entity's transaction records 70 . The filling station 80 , in other words, may use the single cryptographic address 72 to identify the transaction records 70 that correspond to the blockchain data layer 36 . The filling station 80 may thus present a transaction summary of the account 82 and the balance 84 . Because blockchain data layer 36 may track and/or prove the transaction records 70 , exemplary embodiments may search the blockchain data layer 36 for the single cryptographic address 72 .
- the filling station 80 may query the blockchain data layer 36 for the single cryptographic address 72 , and the blockchain data layer 36 may identify the transaction records 70 that match the single cryptographic address 72 . The filling station 80 may then process the transaction records 70 to provide the transaction summary of the account 82 , the balance 84 , and any other transactional data. The filling station 80 may also allow the user to replenish an amount or value of the credit tokens 26 , thus allowing the user to continue exchanging the credit tokens 26 for access to the private blockchain 34 and/or the blockchain data layer 36 .
- FIG. 6 further illustrates the filling station 80 .
- the blockchain data layer 36 may have its own cryptocoinage 90 . That is, a provider of the blockchain data layer 36 may establish its cryptocoinage 90 for accessing and/or using the validation service 42 .
- the cryptocoinage 90 may thus include a credit token and a tradeable token (not shown for simplicity).
- the credit token may be required to enter or access the blockchain data layer 36 to receive the validation service 42 , and the tradeable token may be earned for participating in the validation service 42 .
- the filling station 80 may use the single cryptographic address 72 .
- the third party 60 may use the single cryptographic address 72 to access the entity's cryptocoinage 20 and the blockchain data layer's cryptocoinage 90 . Exemplary embodiments may thus identify and track the transaction records 70 and the blockchain data layer's cryptocoinage 90 using the same, single cryptographic address 72 .
- Exemplary embodiments thus present an elegant solution.
- Any entity 22 may create its own private blockchain 34 .
- the entity 22 may then establish or create entity-specific tokens 26 for using, accessing, or processing the entity's private blockchain 34 .
- the entity-specific tokens 26 may have the value 64 , thus fostering a market for entity-specific tradeable assets in the blockchain environment 24 .
- Exemplary embodiments may thus provide a two-token system that isolates any use of the entity's private blockchain 34 from the entity's tradeable token 52 .
- the credit token 50 may be associated with the third party 60 (perhaps via the single cryptographic address 72 ), thus allowing the third party 60 to retrieve the account balance 84 from the filling station 80 and sign entries or other transactions.
- the third party 60 may also use the single cryptographic address 72 to access the blockchain data layer 36 via the filling station 80 .
- the filling station 80 is a single resource or destination (such as a secure website) for managing a user's cryptographic coinage 20 .
- FIG. 7 expands the entity concept.
- multiple, different entities 22 a - d provide their respective software applications 32 a - d that encrypt their respective private data 30 a - d as their individual, private blockchains 34 a - d.
- FIG. 7 illustrates a simple example of four (4) different entities 22 a - d.
- First entity 22 a for example, again represents the bank, lender, or other financial institution 28 that encrypts its private data 30 a as its private blockchain 34 a.
- Second entity 22 b represents any retailer 90 (such as HOME DEPOT®, KOHL'S®, or WALMART®) that encrypts its private data 30 b as its private blockchain 34 b.
- Third entity 22 c represents a website 92 offering a service 94 (such as AMAZON®, NETFLIX®, or GOOGLE®) that encrypts its private data 30 c as the private blockchain 34 c.
- Fourth entity 22 d represents an automotive or other manufacturer or supplier 96 (such as FORD®, TOYOTA®, or DELPHI®) that encrypts its private data 30 d as the private blockchain 34 d.
- the entities 22 a - d thus use their respective software applications 32 a - d to provide a first layer 98 of cryptographic hashing.
- the entities 22 a - d may also use their respective software applications 32 a - d to issue their own private and entity-specific cryptocoinage 20 a - d.
- Each entity 22 a - d may then send their respective private blockchains 34 a - d to the blockchain data layer 36 , and the blockchain data layer 36 may add a second layer 100 of cryptographic hashing.
- the blockchain data layer 36 thus generates the public blockchain 40 as a public resource or utility for record keeping. Any entity 22 that subscribes to the blockchain data layer 36 (such as by acquiring and/or spending the cryptocoinage 90 . Any entity 22 may thus write and store the proofs 44 of its private data 30 to the public blockchain 40 .
- the blockchain data layer 36 acts as the public ledger 46 that establishes chain of blocks of immutable evidence.
- each entity 22 a - d may establish its own private cryptocoinage 20 a - d.
- Each entity's private software application 32 a - d may create and/or issue its cryptocoinage 20 a - d (such as respective entity-specific tokens 26 above explained).
- Each entity 22 a - d may also establish its own usage restrictions and value (illustrated as reference numerals 62 and 64 in FIGS. 2-3 ) according to rules governing ownership, trade, and other policies.
- Each entity 22 a - d may generate and sends its respective transaction records 70 a - d which reference each entity's single cryptographic address 72 a - d ) to the blockchain data layer 36 for documentation.
- the filling station 80 is agnostic. Any user (such as the entity 22 a - d or the third party 60 ) may authenticate to the filling station 80 . Once authenticated, the user need only enter or provide the correct single cryptographic address 72 a - d to access both the entity's private cryptocoinage 20 a - d and the blockchain data layer's cryptocoinage 90 .
- the single cryptographic address 72 a - d in other words, allows the user to access her account 82 and balance 84 for both entity's private cryptocoinage 20 a - d and the blockchain data layer's cryptocoinage 90 .
- the user may thus easily conduct transactions between the entity's private cryptocoinage 20 a - d and the blockchain data layer's cryptocoinage 90 .
- the entity 22 a - d may fuel or replenish its supply of the blockchain data layer's cryptocoinage 90 , perhaps by redeeming or exchanging the entity's private cryptocoinage 20 a - d (perhaps according to an exchange rate or other value).
- the provider of the blockchain data layer 36 may fuel or replenish its supply of the entity's private cryptocoinage 20 a - d by purchasing or exchanging the blockchain data layer's cryptocoinage 90 .
- the single cryptographic address 72 a - d associated with both the entity's private cryptocoinage 20 a - d and the blockchain data layer's cryptocoinage 90 , allows quick and easy transactions. Moreover, both the respective private blockchains 34 a - d and the blockchain data layer 36 would contain the data records 38 confirming these transactions, so the transaction records 70 a - d thus propagate into the blockchain data layer 36 for public disclosure via the public blockchain 40 . Any user that successfully authenticates to the filling station 80 may access a full accounting of his or her digital cryptocoinages 20 a - d and/or 90 according to the respective single cryptographic address 72 a - d.
- the user may thus buy, sell, trade, and/or redeem any entity-specific cryptocoinages 20 a - d and/or 90 , all by accessing the filling station 80 .
- the user may buy or sell any entity's coins or replenish credits, all by accessing the filling station 80 .
- the filling station 80 is another service offered by the blockchain data layer 36 . Because all the transaction records 70 in the blockchain data layer 36 are identifiable (perhaps via the single cryptographic address 72 ), the filling station 80 can present the summary of the user's credit tokens and tradeable tokens.
- the filling station 80 may thus provide a single or universal electronic wallet for all of a user's digital coinage and credits, regardless of the issuing entity 22 a - d. The user may thus only perform a single authentication to the blockchain data layer 36 and access all her cryptofunds.
- FIGS. 9-11 are more detailed illustrations of an operating environment, according to exemplary embodiments.
- FIG. 9 illustrates an entity server 110 communicating with a data layer server 112 via a communications network 114 .
- the entity server 110 operates on behalf of the entity 22 and generates the entity's private blockchain 34 .
- the entity server 110 in other words, has a processor 116 (e.g., “ ⁇ P”), application specific integrated circuit (ASIC), or other component that executes the entity's software application 32 stored in a local memory device 118 .
- the entity server 110 has a network interface to the communications network 114 , thus allowing two-way, bidirectional communication with the data layer server 112 .
- the entity's software application 32 includes instructions, code, and/or programs that cause the entity server 110 to perform operations, such as calling, invoking, and/or applying an electronic representation of a hashing algorithm 120 to the entity's private data 30 .
- the hashing algorithm 120 thus generates one or more hash values 122 , which are incorporated into the entity's private blockchain 34 .
- the entity's software application 32 then instructs the entity server 110 to send the private blockchain 34 via the communications network 114 to a network address (e.g., Internet protocol address) associated with the data layer server 112 .
- a network address e.g., Internet protocol address
- FIG. 10 illustrates the blockchain data layer 36 .
- the data layer server 112 has a processor 130 (e.g., “ ⁇ P”), application specific integrated circuit (ASIC), or other component that executes a data layer application 132 stored in a local memory device 134 .
- the data layer server 112 has a network interface to the communications network 114 .
- the data layer application 132 includes instructions, code, and/or programs that cause the data layer server 112 to perform operations, such as receiving the entity's private blockchain 34 .
- the data layer application 132 then causes the data layer server 112 to generate the blockchain data layer 36 .
- the data layer application 132 may optionally call, invoke, and/or apply the hashing algorithm 120 to the data records 38 contained within the blockchain data layer 36 .
- the data layer application 132 may also generate the public blockchain 40 .
- the data layer application 132 may thus generate the public ledger 46 that publishes, records, or documents the cryptographic proof 44 of the blocks of data contained within the private blockchain 34 .
- FIG. 11 illustrates additional publication mechanisms.
- the blockchain data layer 36 may be published in a decentralized manner to any destination.
- the data layer server 112 may generate and distribute the public blockchain 40 (via the communications network 114 illustrated in FIGS. 9-10 ) to one or more federated servers 140 . While there may be many federated servers 140 , for simplicity FIG. 11 only illustrates two (2) federated servers 140 a and 140 b.
- the federated servers 140 a and 140 b provide a service and, in return, they are compensated according to a compensation or services agreement or scheme.
- Exemplary embodiments include still more publication mechanisms.
- the cryptographic proof 44 and/or the public blockchain 40 may be sent (via the communications network 114 illustrated in FIGS. 9-10 ) to a server 142 .
- the server 142 may then add another, third layer of cryptographic hashing (perhaps using the hashing algorithm 120 ) and generate another or second public blockchain 144 .
- the server 142 and/or the public blockchain 144 may be operated by, or generated for, any entity, exemplary embodiments may integrate another cryptographic coin mechanism. That is, the server 142 and/or the public blockchain 144 may be associated with BITCOIN®, ETHEREUM®, RIPPLE®, or other cryptographic coin mechanism.
- the cryptographic proof 44 and/or the public blockchain 40 may be publically distributed and/or documented as evidentiary validation. The cryptographic proof 44 and/or the public blockchain 40 may thus be historically and publically anchored for public inspection and review.
- Exemplary embodiments may be applied regardless of networking environment. Exemplary embodiments may be easily adapted to stationary or mobile devices having cellular, wireless fidelity (WI-FI®), near field, and/or BLUETOOTH® capability. Exemplary embodiments may be applied to mobile devices utilizing any portion of the electromagnetic spectrum and any signaling standard (such as the IEEE 802 family of standards, GSM/CDMA/TDMA or any cellular standard, and/or the ISM band). Exemplary embodiments, however, may be applied to any processor-controlled device operating in the radio-frequency domain and/or the Internet Protocol (IP) domain.
- IP Internet Protocol
- Exemplary embodiments may be applied to any processor-controlled device utilizing a distributed computing network, such as the Internet (sometimes alternatively known as the “World Wide Web”), an intranet, a local-area network (LAN), and/or a wide-area network (WAN).
- Exemplary embodiments may be applied to any processor-controlled device utilizing power line technologies, in which signals are communicated via electrical wiring. Indeed, exemplary embodiments may be applied regardless of physical componentry, physical configuration, or communications standard(s).
- Exemplary embodiments may utilize any processing component, configuration, or system.
- Any processor could be multiple processors, which could include distributed processors or parallel processors in a single machine or multiple machines.
- the processor can be used in supporting a virtual processing environment.
- the processor could include a state machine, application specific integrated circuit (ASIC), programmable gate array (PGA) including a Field PGA, or state machine.
- ASIC application specific integrated circuit
- PGA programmable gate array
- any of the processors execute instructions to perform “operations,” this could include the processor performing the operations directly and/or facilitating, directing, or cooperating with another device or component to perform the operations.
- Exemplary embodiments may packetize.
- the entity server 110 and the data layer server 112 may collect, send, and retrieve information.
- the information may be formatted or generated as packets of data according to a packet protocol (such as the Internet Protocol).
- the packets of data contain bits or bytes of data describing the contents, or payload, of a message.
- a header of each packet of data may contain routing information identifying an origination address and/or a destination address.
- FIGS. 12-16 further illustrate the blockchain data layer 36 , according to exemplary embodiments.
- the blockchain data layer 36 chains hashed directory blocks 150 of data into the public blockchain 40 .
- the blockchain data layer 36 accepts input data (such as the entity's private blockchain 34 illustrated in FIGS. 1-10 ) within a window of time. While the window of time may be configurable from fractions of seconds to hours, exemplary embodiments use ten (10) minute intervals.
- FIG. 12 illustrates a simple example of only three (3) directory blocks 150 a - c of data, but in practice there may be millions or billions of different blocks.
- Each directory block 150 of data is linked to the preceding blocks in front and the following or trailing blocks behind. The links are created by hashing all the data within a single directory block 150 and then publishing that hash value within the next directory block.
- published data may be organized within chains 152 .
- Each chain 152 is created with an entry that associates a corresponding chain identifier 154 .
- Each entity 22 a - f in other words, may have its corresponding chain identifier 154 a - d.
- the blockchain data layer 36 may thus track any data associated with the entity 22 a - f with its corresponding chain identifier 154 a - d.
- New and old data in time may be associated with, linked to, identified by, and/or retrieved using the chain identifier 154 a - d.
- Each chain identifier 154 a - d thus functionally resembles a directory 156 a - d (e.g., files and folders) for organized data entries according to the entity 22 a - f
- FIG. 14 illustrates the data records 38 in the blockchain data layer 36 .
- data is received as an input (such as the private blockchain 34 illustrated in FIGS. 1-10 )
- data is recorded within the blockchain data layer 36 as an entry 160 . While the data may have any size, small chunks (such as 10 KB) may be pieced together to create larger file sizes.
- One or more of the entries 160 may be arranged into entry blocks 162 representing each chain 152 according to the corresponding chain identifier 154 . New entries for each chain 152 are added to their respective entry block 162 (again perhaps according to the corresponding chain identifier 154 ).
- all the entry blocks 162 are then placed within in the directory block 150 generated within or occurring within a window 164 of time. While the window 164 of time may be chosen within any range from seconds to hours, exemplary embodiments may use ten (10) minute intervals. That is, all the entry blocks 162 generated every ten minutes are placed within in the directory block 150 .
- FIG. 15 illustrates cryptographic hashing.
- the data layer server 112 executes the data layer application 132 to generate the data records 38 in the blockchain data layer 36 .
- the data layer application 132 may then instruct the data layer server 112 to execute the hashing algorithm 120 on the data records 38 (such as the directory block 150 illustrated in FIGS. 12 & 14 ).
- the hashing algorithm 120 thus generates one or more hash values 166 as a result, and the hash values 166 represent the hashed data records 38 .
- the blockchain data layer 36 may apply a Merkle tree analysis to generate a Merkle root (representing a Merkle proof 44 ) representing each directory block 150 .
- the blockchain data layer 36 may then publish the Merkle proof 44 (as this disclosure explains).
- FIG. 16 illustrates hierarchical hashing.
- the entity's private software application 32 provides the first layer 98 of cryptographic hashing and generates the private blockchain 34 .
- the entity 22 then sends its private blockchain 34 to the data layer server 112 .
- the data layer server 112 executing the data layer application 132 , generates the blockchain data layer 36 .
- the data layer application 132 may optionally provide the second or intermediate layer 100 of cryptographic hashing to generate the cryptographic proof 44 .
- the data layer application 132 may also publish any of the data records 38 as the public blockchain 40 , and the cryptographic proof 44 may or may not also be published via the public blockchain 40 .
- the public blockchain 40 and/or the cryptographic proof 44 may be optionally sent to the server 142 as an input to yet another public blockchain 144 (again, such as BITCOIN®, ETHEREUM®, or RIPPLE®) for a third layer 170 of cryptographic hashing and public publication.
- the first layer 98 and the second layer 100 thus ride or sit atop a conventional public blockchain 144 (again, such as BITCOIN®, ETHEREUM®, or RIPPLE®) and provide additional public and/or private cryptographic proofs 44 .
- Exemplary embodiments may use any hashing function. Many readers may be familiar with the SHA-256 hashing algorithm.
- the SHA-256 hashing algorithm acts on any electronic data or information to generate a 256-bit hash value 64 as a cryptographic key. The key is thus a unique digital signature.
- hashing algorithms There are many hashing algorithms, though, and exemplary embodiments may be adapted to any hashing algorithm.
- FIGS. 17-19 are more detailed illustrations of the single cryptographic address 72 , according to exemplary embodiments.
- the private entity 22 sends its private blockchain 34 to the network address associated with the data layer server 112 that generates the blockchain data layer 36 .
- the private blockchain 34 may contain information representing the transaction records 70 associated with the entity's private cryptocoinage 20 (perhaps as one or more privately hashed blocks 180 of data).
- the private blockchain 34 may also specify, or incorporate, information or data representing the single cryptographic address 72 .
- the single cryptographic address 72 may additionally or alternatively be separately sent from the entity server 110 to the data layer server 112 . Regardless, the entity's private cryptocoinage 20 may be associated with the single cryptographic address 72 .
- the transaction records 70 and/or the privately hashed blocks 180 of data may thus specify, include, reference, and/or be associated with, and/or identified by, the single cryptographic address 72 . Because the single cryptographic address 72 (and/or its corresponding hah value) is an identifiable input to the data layer server 112 generating the blockchain data layer 36 , the data records 38 may also carry or reference the single cryptographic address 72 . So, should the blockchain data layer 36 create or issue its own cryptocoinage 90 , the cryptocoinage 90 may also reference, be identified by, or be associated with the single cryptographic address 72 .
- the single cryptographic address 72 is thus a common indicator or reference data for tracking both the entity's private cryptocoinage 20 and the cryptocoinage 90 issued by the blockchain data layer 36 .
- the transaction records 70 (representing entity's private cryptocoinage 20 ) may thus be commonly mapped or identified to the cryptocoinage 90 issued by the blockchain data layer 36 .
- FIG. 18 illustrates a simple illustration.
- the single cryptographic address 72 may propagate and be recorded within the blockchain data layer 36 .
- the single cryptographic address 72 may be recorded in any of the entries 160 .
- the entry 160 and thus the single cryptographic address 72 , may then be recorded and/or arranged as the entry block 162 and placed within the directory block 150 .
- the entry 160 , the entry block 162 , and the directory block 150 may thus reference, specify, or be associated with, the single cryptographic address 72 .
- the single cryptographic address 72 has thus propagated as informational content from the private blockchain 34 and into and through the blockchain data layer 36 .
- the single cryptographic address 72 thus hierarchically moves through the multiple layers of cryptographic hashing for public publication.
- the blockchain data layer 36 thus tracks the transaction records 70 involving the single cryptographic address 72 .
- the blockchain data layer 36 may track ownership and transfer of the entity's private cryptocoinage 20 and the cryptocoinage 90 issued by the blockchain data layer 36 , all via the common single cryptographic address 72 .
- FIG. 19 illustrates more details. While the single cryptographic address 72 may be any alphanumeric entry or biometric input, FIG. 19 illustrates a common authentication mechanism 190 . Here the same or similar authentication mechanism 190 is used to access both the entity's private cryptocoinage 20 and the cryptocoinage 90 issued by the blockchain data layer 36 . If a user of the blockchain data layer 36 satisfies the authentication mechanism 190 , then exemplary embodiments may access both the private cryptocoinage 20 and the cryptocoinage 90 . As a simple example, suppose the user of the authentication mechanism 190 supplies information or data representing the single cryptographic address 72 . The single cryptographic address 72 may be any unique alphanumeric entry, biometric input, user identifier, or other authentication credential.
- FIG. 19 illustrates a passphrase 192 (such as a multi-word mnemonic).
- the entity's private cryptocoinage 20 may be assigned or associated with the passphrase 192 .
- the passphrase 192 is unique to the registered owner, possessor, or user of the entity's private cryptocoinage 20 .
- the passphrase 192 may even be hashed as a hash value and supplied to the blockchain data layer 36 (as above explained).
- the passphrase 192 in other words, may be hashed as the single cryptographic address 72 and propagated within the blockchain environment 24 to document the transaction records 70 involving the entity's private cryptocoinage 20 .
- the passphrase 192 may also authenticate to the cryptocoinage 90 . If the user correctly supplies the passphrase 192 , then the same user may conduct transactions involving the cryptocoinage 90 issued by the blockchain data layer 36 . Exemplary embodiments thus allow the user to order transactions and exchanges involving both the entity's private cryptocoinage 20 and the cryptocoinage 90 issued by the blockchain data layer 36 .
- FIGS. 20-22 further illustrate the filling station 80 , according to exemplary embodiments.
- the filling station 80 may be a public and/or private service for financial transactions involving either, or both, of the entity's private cryptocoinage 20 and the cryptocoinage 90 issued by the blockchain data layer 36 .
- FIG. 20 illustrates the filling station 80 as a software-as-a-service offered by the secure data layer server 112 for accessing the blockchain data layer 36 .
- the filling station 80 may be a module within, or called by, the data layer application 132 .
- a user accesses the filling station 80 to conduct transactions involving her private cryptocoinage 20 (issued by the entity 22 ) and the cryptocoinage 90 (issued by the blockchain data layer 36 ).
- FIG. 20 illustrates a web interface 194 . That is, the filling station 80 may be accessed via a webpage 196 .
- the webpage 196 prompts the user to input her authentication credentials according to the authentication mechanism 190 (such as typing the passphrase 192 into a data field or audibly speaking the passphrase 192 ).
- FIG. 22 further illustrates the web interface 194 .
- the user accesses the filling station 80 using a user device 200 .
- the user device 200 may be any processor-controlled device, most readers are familiar with a smartphone 202 . If the smartphone 202 correctly sends authentication credentials (such as the single cryptographic address 72 and/or passphrase 192 , as above explained), then the smartphone 202 may utilize the web interface 194 to the data layer server 112 and/or the blockchain data layer 36 .
- the smartphone 202 executes a web browser and/or a mobile application to send a request 204 specifying an address or domain name associated with or representing the filling station 80 .
- the web interface 194 to the data layer server 112 thus sends the webpage 196 as a response, and the user's smartphone 202 downloads the webpage 196 .
- the smartphone 202 has a processor and memory device that executes (not shown for simplicity) that causes a display of the webpage 196 as a graphical user interface (or “GUI”) 206 on its display device 208 .
- the GUI 206 may generate one or more prompts or fields for specifying the authentication mechanism 190 and transactional options.
- the user preferably enters, speaks, or otherwise provides the passphrase 192 .
- Exemplary embodiments may or may not hash the authentication passphrase (using the hashing algorithm 120 above explained) to produce or generate a hashed passphrase.
- Exemplary embodiments may then search the blockchain data layer 36 for the data records 38 . That is, exemplary embodiments may query the blockchain data layer 36 for a query parameter (such as the single cryptographic address 72 , the passphrase 192 , and/or their hashed value) and the blockchain data layer 36 identifies the data records 38 that match or reference the query parameter.
- the filling station 80 may then process the data records 38 to provide a transactional summary 210 of the account 82 , the balance 84 , and any other transactional data.
- the filling station 80 may also allow the user to replenish an amount or value of the private cryptocoinage 20 and/or the cryptocoinage 90 , even allowing the user to continue exchanging the cryptocoinage 20 for access to the blockchain data layer 36 .
- Exemplary embodiments may thus share the common authentication mechanism 190 . If the entity's private software application 32 requires the same passphrase 192 to buy, sell, or otherwise transact the private cryptocoinage 20 , then the passphrase 192 may have been hashed (perhaps as the single cryptographic address 72 ) and recorded within the blockchain data layer 36 .
- the single cryptographic address 72 in other words, may be associated with the data records 38 representing both the private cryptocoinage 20 (issued by the entity 22 ) and the cryptocoinage 90 (issued by the blockchain data layer 36 ).
- the filling station 80 may thus identify any of the data records 38 that are commonly associated with the single cryptographic address 72 , the private cryptocoinage 20 (issued by the entity 22 ), and/or the cryptocoinage 90 .
- the filling station 80 thus allows the user to exchange cryptocoinage 20 and 90 for access to the private blockchain 34 and/or the blockchain data layer 36 .
- FIG. 22 illustrates a query mechanism.
- the data layer server 112 may access a database 220 of data layer records.
- the database 220 of data layer records provides a referential record of the informational content contained within the blockchain data layer 36 .
- FIG. 22 illustrates the data layer server 112 locally storing the database 220 of data layer records in its local memory device 134 , but the database 220 of data layer records may be remotely stored and accessed via the communications network 114 .
- the data layer server 112 may query the database 220 of data layer records for the single cryptographic address 72 and identify and/or retrieve any corresponding data records 38 . While the database 220 of data layer records may have any logical structure, FIG.
- the database 220 of data layer records as a table 222 that maps, converts, or translates the single cryptographic address 72 to its corresponding entry 160 , entry block 162 , and/or directory block 150 within the blockchain data layer 36 .
- the data layer server 112 may add an entry to the database 220 of data layer records.
- the database 220 of data layer tracks a comprehensive historical repository of information that is electronically associated with its corresponding single cryptographic address 72 .
- the data layer server 112 may then read or retrieve the entry 160 , entry block 162 , and/or directory block 150 containing or corresponding to the single cryptographic address 72 .
- Exemplary embodiments thus present the entity-specific cryptocoinage 20 .
- Any entity 22 may create its own private blockchain 34 and establish its entity-specific tokens 26 .
- the entity-specific tokens 26 may or may not have the value 64 .
- the tradeable token 52 may have a market value based on supply and/or demand, thus allowing or causing the value 64 of the tradeable token 52 to rise/fall or to increase/decrease, based on market forces.
- the credit token 50 may have a constant price or value, perhaps set by the entity 22 .
- the entity-specific tokens 26 may be associated with the same shared single cryptographic address 72 , thus allowing a faster and simpler accounting scheme for each user and/or account 82 .
- Exemplary embodiments thus create coinage on top of coinage.
- the hierarchical scheme (explained with reference to FIG. 16 ) allows the private entity 22 to establish its private cryptocoinage 20 hierarchically above the traditional BITCOIN®, ETHEREUM®, or RIPPLE® coinage.
- the entity's private data 30 remains private, but the transaction records 70 may be publically documented or proved via the traditional BITCOIN®, ETHEREUM®, or RIPPLE® environment.
- the private entity 22 in other words, need to worry about or concern itself with public publication.
- the private entity 22 need only subscribe (e.g., pay for write access) to the blockchain data layer 36 .
- FIG. 23 illustrates a public entity 230 , according to exemplary embodiments.
- exemplary embodiments may be applied to public data 232 generated by the public entity 230 .
- the public entity 230 may be a city, state, or federal governmental agency, but the public entity 230 may also be a contractor, non-governmental organization, or other actor that acts on behalf of the governmental agency.
- the public entity 230 operates a public server 234 and applies its software application 236 to its public data 232 to generate its governmental blockchain 238 .
- the public entity 230 may further generate/issue its cryptocoinage 240 .
- the data layer server 112 receives the governmental blockchain 238 and generates the blockchain data layer 36 .
- the data layer server 112 may then generate the public blockchain 40 representing any data records 38 representing the public data 232 and/or the cryptocoinage 240 .
- FIG. 24 is a flowchart illustrating a method or algorithm for the private, entity based cryptocoinage 20 , according to exemplary embodiments.
- the electronic private data 30 representing the private cryptocoinage 20 is generated (Block 300 ), hashed (Block 302 ), and incorporated into the private blockchain 34 (Block 304 ).
- the private blockchain 34 is received by the data layer server 112 (Block 306 ) and the data records 38 in the blockchain data layer 36 are generated (Block 308 ).
- the data records 38 in the blockchain data layer 36 may be hashed (Block 310 ) and incorporated into the public blockchain 34 (Block 312 ).
- the filling station 80 may access the data records 38 in the blockchain data layer 36 (Block 316 ) representing the private cryptocoinage 20 .
- FIG. 25 is a schematic illustrating still more exemplary embodiments.
- FIG. 25 is a more detailed diagram illustrating a processor-controlled device 350 .
- the entity's private software application 32 and/or the data layer application 132 may partially or entirely operate in any mobile or stationary processor-controlled device.
- FIG. 25 illustrates the entity's private software application 32 and/or the data layer application 132 stored in a memory subsystem of the processor-controlled device 350 .
- One or more processors communicate with the memory subsystem and execute either, some, or all applications. Because the processor-controlled device 350 is well known to those of ordinary skill in the art, no further explanation is needed.
- FIG. 26 depicts other possible operating environments for additional aspects of the exemplary embodiments.
- FIG. 26 illustrates the entity's private software application 32 and/or the data layer application 132 operating within various other processor-controlled devices 350 .
- FIG. 26 illustrates that the entity's private software application 32 and/or the data layer application 132 may entirely or partially operate within a set-top box (“STB”) ( 352 ), a personal/digital video recorder (PVR/DVR) 354 , a Global Positioning System (GPS) device 356 , an interactive television 358 , a tablet computer 360 , or any computer system, communications device, or processor-controlled device utilizing any of the processors above described and/or a digital signal processor (DP/DSP) 362 .
- STB set-top box
- PVR/DVR personal/digital video recorder
- GPS Global Positioning System
- DSP digital signal processor
- the processor-controlled device 350 may also include wearable devices (such as watches), radios, vehicle electronics, clocks, printers, gateways, mobile/implantable medical devices, and other apparatuses and systems. Because the architecture and operating principles of the various devices 350 are well known, the hardware and software componentry of the various devices 350 are not further shown and described.
- Exemplary embodiments may be applied to any signaling standard. Most readers are thought familiar with the Global System for Mobile (GSM) communications signaling standard. Those of ordinary skill in the art, however, also recognize that exemplary embodiments are equally applicable to any communications device utilizing the Time Division Multiple Access signaling standard, the Code Division Multiple Access signaling standard, the “dual-mode” GSM-ANSI Interoperability Team (GAIT) signaling standard, or any variant of the GSM/CDMA/TDMA signaling standard. Exemplary embodiments may also be applied to other standards, such as the I.E.E.E. 802 family of standards, the Industrial, Scientific, and Medical band of the electromagnetic spectrum, BLUETOOTH®, and any other.
- GSM Global System for Mobile
- Exemplary embodiments may be physically embodied on or in a computer-readable storage medium.
- This computer-readable medium may include CD-ROM, DVD, tape, cassette, floppy disk, optical disk, memory card, memory drive, and large-capacity disks.
- This computer-readable medium, or media could be distributed to end-subscribers, licensees, and assignees.
- a computer program product comprises processor-executable instructions for establishing the entity-specific private cryptocoinage 20 , as the above paragraphs explain.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Databases & Information Systems (AREA)
- Power Engineering (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application relates to U.S. application Ser. No. ______ filed May 18, 2018, entitled “Load Balancing in Blockchain Environments” (Attorney Docket Factom #11), and incorporated herein by reference in its entirety. This application also relates to U.S. application Ser. No. ______ filed May 18, 2018, entitled “Import and Export in Blockchain Environments” (Attorney Docket Factom #12), and incorporated herein by reference in its entirety. This application also relates to U.S. application Ser. No. ______ filed May 18, 2018, entitled “Personal Blockchain Services” (Attorney Docket Factom #13), and incorporated herein by reference in its entirety. This application also relates to U.S. application Ser. No. ______ filed May 18, 2018, entitled “Private Blockchain Services” (Attorney Docket Factom #14), and incorporated herein by reference in its entirety.
- Decentralized cryptographic coinage is growing. As cryptographic coinage continues to gain acceptance, many entities will want to offer their own cryptographic coinage.
- The features, aspects, and advantages of the exemplary embodiments are understood when the following Detailed Description is read with reference to the accompanying drawings, wherein:
-
FIGS. 1-8 are simplified illustrations of entity-based cryptographic coinage, according to exemplary embodiments; -
FIGS. 9-11 are detailed illustrations of an operating environment, according to exemplary embodiments; -
FIGS. 12-16 illustrate a blockchain data layer, according to exemplary embodiments; -
FIGS. 17-19 illustrate a single cryptographic address, according to exemplary embodiments; -
FIGS. 20-22 illustrate a filling station, according to exemplary embodiments; -
FIG. 23 illustrates a public entity, according to exemplary embodiments; -
FIG. 24 is a flowchart illustrating a method or algorithm for the private, entity based cryptocoinage, according to exemplary embodiments; and -
FIGS. 25-26 depict still more operating environments for additional aspects of the exemplary embodiments. - The exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings. The exemplary embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the exemplary embodiments to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).
- Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating the exemplary embodiments. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named manufacturer.
- As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless expressly stated otherwise. It will be further understood that the terms “includes,” “comprises,” “including,” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Furthermore, “connected” or “coupled” as used herein may include wirelessly connected or coupled. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
- It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first device could be termed a second device, and, similarly, a second device could be termed a first device without departing from the teachings of the disclosure.
-
FIGS. 1-8 are simplified illustrations of entity-basedcryptographic coinage 20, according to exemplary embodiments. Here anyentity 22 may create its owncryptographic coinage 20 in ablockchain environment 24. Theentity 22, in other words, may establish entity-specificelectronic tokens 26 to access and/or to use theblockchain environment 24. While exemplary embodiments may be applied to anyentity 22, most readers are thought familiar with financial services. That is, suppose theentity 22 is a bank, lender, or other financial institution 28 (such as PIMCO®, CITI®, or BANK OF AMERICA®). As the reader likely understands, thefinancial institution 28 creates a massive amount of banking records, transaction records, mortgage instruments, and otherprivate data 30. Thefinancial institution 28 thus has asoftware application 32 that encrypts itsprivate data 30. While thefinancial institution 28 may use any encryption scheme,FIG. 1 illustrates aprivate blockchain 34. That is, thefinancial institution 28 cryptographically hashes theprivate data 30 into theprivate blockchain 34 and sends or feeds theprivate blockchain 34 to ablockchain data layer 36. Theblockchain data layer 36 generatesvarious data records 38, as later paragraphs will explain. Moreover, theblockchain data layer 36 may also add another layer of cryptographic hashing to generate apublic blockchain 40. Theblockchain data layer 36 acts as avalidation service 42 and generates acryptographic proof 44. Thepublic blockchain 40 thus publishes thecryptographic proof 44 as apublic ledger 46 that establishes chains of blocks of immutable evidence. - The entity-
specific tokens 26 are associated with theentity 22. Thefinancial institution 28, for example, generates and/or issues the entity-specific tokens 26 to access theprivate blockchain 34. Because theprivate blockchain 34 represents hashes of the financial institution'sprivate data 30, theprivate blockchain 34 may be considered a private resource or property of thefinancial institution 28. That is, theprivate blockchain 34 is controlled by, or affiliated with, thefinancial institution 28, so thefinancial institution 28 may control who adds and/or writes to theprivate blockchain 34 and who reads, accesses, or receives theprivate blockchain 34. - The entity-
specific tokens 26 may thus be control mechanisms. While the entity-specific tokens 26 may have any functional scheme,FIG. 1 illustrates aprivate credit token 50 and a privatetradeable token 52. The entity'scredit token 50, for example, may be acquired and then spent or burned when accessing the financial institution'sprivate blockchain 34. The entity'scredit token 50, in other words, represents any credit-based entry system associated with the financial institution'sprivate blockchain 34. Thetradeable token 52, on the other hand, may be generated for transfer among others. Theentity 22 generates thetradeable token 52 to be traded and/or spent. Thetradeable token 52, in other words, may be considered as the entity's specific, private currency to be used as theentity 22 governs. -
FIGS. 2-3 illustrate examples of the entity-specific tokens 26. Suppose that a third-party 60 wishes to receive, read, write to, or otherwise access the financial institution'sprivate blockchain 34. AsFIG. 2 illustrates, exemplary embodiments may require that the third-party 60 spend or burn one or more of thecredit tokens 50. Thecredit token 50 may thus control access to the financial institution'sprivate blockchain 34. The inventor envisions that vendors, service providers, individual users, and other third-parties 60 may wish to access the hash values of theprivate data 30 contained within the financial institution'sprivate blockchain 34. Thefinancial institution 28 may thus require that the third-party 60 redeem the entity's credit token(s) 50 before granting read, write, or access permission. Thefinancial institution 28 may additionally or alternatively require redemption of the entity's credit token(s) 50 for using protocols, rules, and application programming interfaces (“APIs”) associated with theprivate blockchain 34. Thefinancial institution 28 may thus establish or issue itsown credit tokens 50 and even govern theirusage restrictions 62 andvalue 64, as later paragraphs will explain. -
FIG. 3 illustrates thetradeable token 52. Thefinancial institution 28 may establish thetradeable token 52 and also govern itsusage restrictions 62 andvalue 64. Thetradeable token 52, in other words, is a cryptocurrency or “coin.” Again, while exemplary embodiments may utilize any functional scheme, thetradeable token 52 may be earned. That is, anyone (such as the third party 60) may earn thetradeable token 52 according to theusage restrictions 62. For example, suppose theblockchain data layer 36 earns the entity's tradeable token(s) 52 in exchange for thevalidation service 42. That is, a provider of thevalidation service 42 is paid, or earns, the entity's tradeable token(s) 52 for cryptographically hashing theproof 44. The provider of thevalidation service 42 may also be paid in the entity's tradeable token(s) 52 for publishing theproof 44. Thetradeable token 52 may thus be transferred as currency according to theusage restrictions 62 and itsvalue 64. -
FIG. 4 illustrates transaction records 70. Whenever the entity-specific tokens 26 are created, owned, or transferred, thetransaction record 70 may be generated. Thetransaction record 70 may then be documented in theblockchain environment 24. For example, the entity-specific tokens 26 may be addressable. That is, thecredit token 50 and thetradeable token 52 may be uniquely associated with a common,single cryptographic address 72. Thecryptographic address 72 may represent an owner or holder (e.g., theentity 22 or the third-party 60). When the entity-specific tokens 26 are created, generated, or assigned, the entity-specific tokens 26 may be assigned or associated with thecryptographic address 72. Thecryptographic address 72 may then be received by, and propagated within, theblockchain data layer 36 to identify the corresponding data records 38. Theblockchain data layer 36 may even hash thecryptographic address 72 as thecryptographic proof 44 of the transaction records 70. Exemplary embodiments thus publically document the transaction records 70 involving the entity-specific tokens 26, based on thesingle cryptographic address 72. In simple words, theblockchain data layer 36 publishes ownership and transferproofs 44 of thecredit token 50 and thetradeable token 52 based on the transaction records 70 associated with thesingle cryptographic address 72. -
FIG. 5 illustrates a fillingstation 80 in theblockchain environment 24. Because the entity'scredit tokens 26 may be consumed by users (such as the third-party entity 22), the fillingstation 80 allows thethird party 60 to replenish or fill anaccount 82. Recall that the third-party entity 22 may be required to spend thecredit tokens 26 to access the financial institution'sprivate blockchain 34. The third-party entity 22 may thus establish theaccount 82 and maintain a monetary ornumerical balance 84 of the entity'scredit tokens 26. As the third-party entity 22 redeems thecredit tokens 26, theaccount 82 may need filling to continue using or accessing the financial institution'sprivate blockchain 34. - The filling
station 80 may access both the entity's transaction records 70 and theblockchain data layer 36. Because theblockchain data layer 36 may document the data records 38 using thesingle cryptographic address 72, thesingle cryptographic address 72 may serve as a common reference or query parameter with the entity's transaction records 70. The fillingstation 80, in other words, may use thesingle cryptographic address 72 to identify the transaction records 70 that correspond to theblockchain data layer 36. The fillingstation 80 may thus present a transaction summary of theaccount 82 and thebalance 84. Becauseblockchain data layer 36 may track and/or prove the transaction records 70, exemplary embodiments may search theblockchain data layer 36 for thesingle cryptographic address 72. That is, the fillingstation 80 may query theblockchain data layer 36 for thesingle cryptographic address 72, and theblockchain data layer 36 may identify the transaction records 70 that match thesingle cryptographic address 72. The fillingstation 80 may then process the transaction records 70 to provide the transaction summary of theaccount 82, thebalance 84, and any other transactional data. The fillingstation 80 may also allow the user to replenish an amount or value of thecredit tokens 26, thus allowing the user to continue exchanging thecredit tokens 26 for access to theprivate blockchain 34 and/or theblockchain data layer 36. -
FIG. 6 further illustrates the fillingstation 80. Here theblockchain data layer 36 may have itsown cryptocoinage 90. That is, a provider of theblockchain data layer 36 may establish itscryptocoinage 90 for accessing and/or using thevalidation service 42. Thecryptocoinage 90 may thus include a credit token and a tradeable token (not shown for simplicity). The credit token may be required to enter or access theblockchain data layer 36 to receive thevalidation service 42, and the tradeable token may be earned for participating in thevalidation service 42. Regardless, the fillingstation 80 may use thesingle cryptographic address 72. Thethird party 60 may use thesingle cryptographic address 72 to access the entity'scryptocoinage 20 and the blockchain data layer'scryptocoinage 90. Exemplary embodiments may thus identify and track the transaction records 70 and the blockchain data layer'scryptocoinage 90 using the same,single cryptographic address 72. - Exemplary embodiments thus present an elegant solution. Any
entity 22 may create its ownprivate blockchain 34. Theentity 22 may then establish or create entity-specific tokens 26 for using, accessing, or processing the entity'sprivate blockchain 34. The entity-specific tokens 26 may have thevalue 64, thus fostering a market for entity-specific tradeable assets in theblockchain environment 24. Exemplary embodiments may thus provide a two-token system that isolates any use of the entity'sprivate blockchain 34 from the entity'stradeable token 52. Moreover, thecredit token 50 may be associated with the third party 60 (perhaps via the single cryptographic address 72), thus allowing thethird party 60 to retrieve theaccount balance 84 from the fillingstation 80 and sign entries or other transactions. Moreover, thethird party 60 may also use thesingle cryptographic address 72 to access theblockchain data layer 36 via the fillingstation 80. The fillingstation 80 is a single resource or destination (such as a secure website) for managing a user'scryptographic coinage 20. -
FIG. 7 expands the entity concept. Here multiple,different entities 22 a-d provide theirrespective software applications 32 a-d that encrypt their respectiveprivate data 30 a-d as their individual,private blockchains 34 a-d. While exemplary embodiments may be applied to any number of industries or services,FIG. 7 illustrates a simple example of four (4)different entities 22 a-d.First entity 22 a, for example, again represents the bank, lender, or otherfinancial institution 28 that encrypts itsprivate data 30 a as itsprivate blockchain 34 a. Second entity 22 b represents any retailer 90 (such as HOME DEPOT®, KOHL'S®, or WALMART®) that encrypts itsprivate data 30 b as itsprivate blockchain 34 b. Third entity 22 c represents awebsite 92 offering a service 94 (such as AMAZON®, NETFLIX®, or GOOGLE®) that encrypts itsprivate data 30 c as theprivate blockchain 34 c. Fourth entity 22 d represents an automotive or other manufacturer or supplier 96 (such as FORD®, TOYOTA®, or DELPHI®) that encrypts itsprivate data 30 d as theprivate blockchain 34 d. Theentities 22 a-d thus use theirrespective software applications 32 a-d to provide afirst layer 98 of cryptographic hashing. Theentities 22 a-d may also use theirrespective software applications 32 a-d to issue their own private and entity-specific cryptocoinage 20 a-d. Eachentity 22 a-d may then send their respectiveprivate blockchains 34 a-d to theblockchain data layer 36, and theblockchain data layer 36 may add asecond layer 100 of cryptographic hashing. Theblockchain data layer 36 thus generates thepublic blockchain 40 as a public resource or utility for record keeping. Anyentity 22 that subscribes to the blockchain data layer 36 (such as by acquiring and/or spending thecryptocoinage 90. Anyentity 22 may thus write and store theproofs 44 of itsprivate data 30 to thepublic blockchain 40. Theblockchain data layer 36, in other words, acts as thepublic ledger 46 that establishes chain of blocks of immutable evidence. - As
FIG. 7 also illustrates, eachentity 22 a-d may establish its ownprivate cryptocoinage 20 a-d. Each entity'sprivate software application 32 a-d may create and/or issue itscryptocoinage 20 a-d (such as respective entity-specific tokens 26 above explained). Eachentity 22 a-d may also establish its own usage restrictions and value (illustrated as 62 and 64 inreference numerals FIGS. 2-3 ) according to rules governing ownership, trade, and other policies. Eachentity 22 a-d may generate and sends itsrespective transaction records 70 a-d which reference each entity'ssingle cryptographic address 72 a-d) to theblockchain data layer 36 for documentation. - As
FIG. 8 illustrates, the fillingstation 80 is agnostic. Any user (such as theentity 22 a-d or the third party 60) may authenticate to the fillingstation 80. Once authenticated, the user need only enter or provide the correctsingle cryptographic address 72 a-d to access both the entity'sprivate cryptocoinage 20 a-d and the blockchain data layer'scryptocoinage 90. Thesingle cryptographic address 72 a-d, in other words, allows the user to access heraccount 82 andbalance 84 for both entity'sprivate cryptocoinage 20 a-d and the blockchain data layer'scryptocoinage 90. The user may thus easily conduct transactions between the entity'sprivate cryptocoinage 20 a-d and the blockchain data layer'scryptocoinage 90. Theentity 22 a-d, for example, may fuel or replenish its supply of the blockchain data layer'scryptocoinage 90, perhaps by redeeming or exchanging the entity'sprivate cryptocoinage 20 a-d (perhaps according to an exchange rate or other value). Similarly, the provider of theblockchain data layer 36 may fuel or replenish its supply of the entity'sprivate cryptocoinage 20 a-d by purchasing or exchanging the blockchain data layer'scryptocoinage 90. Thesingle cryptographic address 72 a-d, associated with both the entity'sprivate cryptocoinage 20 a-d and the blockchain data layer'scryptocoinage 90, allows quick and easy transactions. Moreover, both the respectiveprivate blockchains 34 a-d and theblockchain data layer 36 would contain the data records 38 confirming these transactions, so thetransaction records 70 a-d thus propagate into theblockchain data layer 36 for public disclosure via thepublic blockchain 40. Any user that successfully authenticates to the fillingstation 80 may access a full accounting of his or herdigital cryptocoinages 20 a-d and/or 90 according to the respectivesingle cryptographic address 72 a-d. The user may thus buy, sell, trade, and/or redeem any entity-specific cryptocoinages 20 a-d and/or 90, all by accessing the fillingstation 80. The user may buy or sell any entity's coins or replenish credits, all by accessing the fillingstation 80. - Exemplary embodiments thus present another elegant solution. The filling
station 80 is another service offered by theblockchain data layer 36. Because all the transaction records 70 in theblockchain data layer 36 are identifiable (perhaps via the single cryptographic address 72), the fillingstation 80 can present the summary of the user's credit tokens and tradeable tokens. The fillingstation 80 may thus provide a single or universal electronic wallet for all of a user's digital coinage and credits, regardless of the issuingentity 22 a-d. The user may thus only perform a single authentication to theblockchain data layer 36 and access all her cryptofunds. -
FIGS. 9-11 are more detailed illustrations of an operating environment, according to exemplary embodiments.FIG. 9 illustrates anentity server 110 communicating with adata layer server 112 via acommunications network 114. Theentity server 110 operates on behalf of theentity 22 and generates the entity'sprivate blockchain 34. Theentity server 110, in other words, has a processor 116 (e.g., “μP”), application specific integrated circuit (ASIC), or other component that executes the entity'ssoftware application 32 stored in alocal memory device 118. Theentity server 110 has a network interface to thecommunications network 114, thus allowing two-way, bidirectional communication with thedata layer server 112. The entity'ssoftware application 32 includes instructions, code, and/or programs that cause theentity server 110 to perform operations, such as calling, invoking, and/or applying an electronic representation of ahashing algorithm 120 to the entity'sprivate data 30. Thehashing algorithm 120 thus generates one or more hash values 122, which are incorporated into the entity'sprivate blockchain 34. The entity'ssoftware application 32 then instructs theentity server 110 to send theprivate blockchain 34 via thecommunications network 114 to a network address (e.g., Internet protocol address) associated with thedata layer server 112. -
FIG. 10 illustrates theblockchain data layer 36. Thedata layer server 112 has a processor 130 (e.g., “μP”), application specific integrated circuit (ASIC), or other component that executes adata layer application 132 stored in alocal memory device 134. Thedata layer server 112 has a network interface to thecommunications network 114. Thedata layer application 132 includes instructions, code, and/or programs that cause thedata layer server 112 to perform operations, such as receiving the entity'sprivate blockchain 34. Thedata layer application 132 then causes thedata layer server 112 to generate theblockchain data layer 36. Thedata layer application 132 may optionally call, invoke, and/or apply thehashing algorithm 120 to the data records 38 contained within theblockchain data layer 36. Thedata layer application 132 may also generate thepublic blockchain 40. Thedata layer application 132 may thus generate thepublic ledger 46 that publishes, records, or documents thecryptographic proof 44 of the blocks of data contained within theprivate blockchain 34. -
FIG. 11 illustrates additional publication mechanisms. Once theblockchain data layer 36 is generated, theblockchain data layer 36 may be published in a decentralized manner to any destination. Thedata layer server 112, for example, may generate and distribute the public blockchain 40 (via thecommunications network 114 illustrated inFIGS. 9-10 ) to one or more federated servers 140. While there may be many federated servers 140, for simplicityFIG. 11 only illustrates two (2) 140 a and 140 b. Thefederated servers 140 a and 140 b provide a service and, in return, they are compensated according to a compensation or services agreement or scheme.federated servers - Exemplary embodiments include still more publication mechanisms. For example, the
cryptographic proof 44 and/or thepublic blockchain 40 may be sent (via thecommunications network 114 illustrated inFIGS. 9-10 ) to aserver 142. Theserver 142 may then add another, third layer of cryptographic hashing (perhaps using the hashing algorithm 120) and generate another or secondpublic blockchain 144. While theserver 142 and/or thepublic blockchain 144 may be operated by, or generated for, any entity, exemplary embodiments may integrate another cryptographic coin mechanism. That is, theserver 142 and/or thepublic blockchain 144 may be associated with BITCOIN®, ETHEREUM®, RIPPLE®, or other cryptographic coin mechanism. Thecryptographic proof 44 and/or thepublic blockchain 40 may be publically distributed and/or documented as evidentiary validation. Thecryptographic proof 44 and/or thepublic blockchain 40 may thus be historically and publically anchored for public inspection and review. - Exemplary embodiments may be applied regardless of networking environment. Exemplary embodiments may be easily adapted to stationary or mobile devices having cellular, wireless fidelity (WI-FI®), near field, and/or BLUETOOTH® capability. Exemplary embodiments may be applied to mobile devices utilizing any portion of the electromagnetic spectrum and any signaling standard (such as the IEEE 802 family of standards, GSM/CDMA/TDMA or any cellular standard, and/or the ISM band). Exemplary embodiments, however, may be applied to any processor-controlled device operating in the radio-frequency domain and/or the Internet Protocol (IP) domain. Exemplary embodiments may be applied to any processor-controlled device utilizing a distributed computing network, such as the Internet (sometimes alternatively known as the “World Wide Web”), an intranet, a local-area network (LAN), and/or a wide-area network (WAN). Exemplary embodiments may be applied to any processor-controlled device utilizing power line technologies, in which signals are communicated via electrical wiring. Indeed, exemplary embodiments may be applied regardless of physical componentry, physical configuration, or communications standard(s).
- Exemplary embodiments may utilize any processing component, configuration, or system. Any processor could be multiple processors, which could include distributed processors or parallel processors in a single machine or multiple machines. The processor can be used in supporting a virtual processing environment. The processor could include a state machine, application specific integrated circuit (ASIC), programmable gate array (PGA) including a Field PGA, or state machine. When any of the processors execute instructions to perform “operations,” this could include the processor performing the operations directly and/or facilitating, directing, or cooperating with another device or component to perform the operations.
- Exemplary embodiments may packetize. When the
entity server 110 and thedata layer server 112 communicate via thecommunications network 114, theentity server 110 and thedata layer server 112 may collect, send, and retrieve information. The information may be formatted or generated as packets of data according to a packet protocol (such as the Internet Protocol). The packets of data contain bits or bytes of data describing the contents, or payload, of a message. A header of each packet of data may contain routing information identifying an origination address and/or a destination address. -
FIGS. 12-16 further illustrate theblockchain data layer 36, according to exemplary embodiments. Theblockchain data layer 36 chains hashed directory blocks 150 of data into thepublic blockchain 40. For example, theblockchain data layer 36 accepts input data (such as the entity'sprivate blockchain 34 illustrated inFIGS. 1-10 ) within a window of time. While the window of time may be configurable from fractions of seconds to hours, exemplary embodiments use ten (10) minute intervals.FIG. 12 illustrates a simple example of only three (3)directory blocks 150 a-c of data, but in practice there may be millions or billions of different blocks. Each directory block 150 of data is linked to the preceding blocks in front and the following or trailing blocks behind. The links are created by hashing all the data within asingle directory block 150 and then publishing that hash value within the next directory block. - As
FIG. 13 illustrates, published data may be organized within chains 152. Each chain 152 is created with an entry that associates a corresponding chain identifier 154. Eachentity 22 a-f, in other words, may have its corresponding chain identifier 154 a-d. Theblockchain data layer 36 may thus track any data associated with theentity 22 a-f with its corresponding chain identifier 154 a-d. New and old data in time may be associated with, linked to, identified by, and/or retrieved using the chain identifier 154 a-d. Each chain identifier 154 a-d thus functionally resembles a directory 156 a-d (e.g., files and folders) for organized data entries according to theentity 22 a-f -
FIG. 14 illustrates the data records 38 in theblockchain data layer 36. As data is received as an input (such as theprivate blockchain 34 illustrated inFIGS. 1-10 ), data is recorded within theblockchain data layer 36 as anentry 160. While the data may have any size, small chunks (such as 10 KB) may be pieced together to create larger file sizes. One or more of theentries 160 may be arranged into entry blocks 162 representing each chain 152 according to the corresponding chain identifier 154. New entries for each chain 152 are added to their respective entry block 162 (again perhaps according to the corresponding chain identifier 154). After theentries 160 have been made within the proper entry blocks 162, all the entry blocks 162 are then placed within in thedirectory block 150 generated within or occurring within awindow 164 of time. While thewindow 164 of time may be chosen within any range from seconds to hours, exemplary embodiments may use ten (10) minute intervals. That is, all the entry blocks 162 generated every ten minutes are placed within in thedirectory block 150. -
FIG. 15 illustrates cryptographic hashing. Thedata layer server 112 executes thedata layer application 132 to generate the data records 38 in theblockchain data layer 36. Thedata layer application 132 may then instruct thedata layer server 112 to execute thehashing algorithm 120 on the data records 38 (such as thedirectory block 150 illustrated inFIGS. 12 & 14 ). Thehashing algorithm 120 thus generates one ormore hash values 166 as a result, and the hash values 166 represent the hashed data records 38. As one example, theblockchain data layer 36 may apply a Merkle tree analysis to generate a Merkle root (representing a Merkle proof 44) representing eachdirectory block 150. Theblockchain data layer 36 may then publish the Merkle proof 44 (as this disclosure explains). -
FIG. 16 illustrates hierarchical hashing. The entity'sprivate software application 32 provides thefirst layer 98 of cryptographic hashing and generates theprivate blockchain 34. Theentity 22 then sends itsprivate blockchain 34 to thedata layer server 112. Thedata layer server 112, executing thedata layer application 132, generates theblockchain data layer 36. Thedata layer application 132 may optionally provide the second orintermediate layer 100 of cryptographic hashing to generate thecryptographic proof 44. Thedata layer application 132 may also publish any of the data records 38 as thepublic blockchain 40, and thecryptographic proof 44 may or may not also be published via thepublic blockchain 40. Thepublic blockchain 40 and/or thecryptographic proof 44 may be optionally sent to theserver 142 as an input to yet another public blockchain 144 (again, such as BITCOIN®, ETHEREUM®, or RIPPLE®) for athird layer 170 of cryptographic hashing and public publication. Thefirst layer 98 and thesecond layer 100 thus ride or sit atop a conventional public blockchain 144 (again, such as BITCOIN®, ETHEREUM®, or RIPPLE®) and provide additional public and/or private cryptographic proofs 44. - Exemplary embodiments may use any hashing function. Many readers may be familiar with the SHA-256 hashing algorithm. The SHA-256 hashing algorithm acts on any electronic data or information to generate a 256-
bit hash value 64 as a cryptographic key. The key is thus a unique digital signature. There are many hashing algorithms, though, and exemplary embodiments may be adapted to any hashing algorithm. -
FIGS. 17-19 are more detailed illustrations of thesingle cryptographic address 72, according to exemplary embodiments. Theprivate entity 22 sends itsprivate blockchain 34 to the network address associated with thedata layer server 112 that generates theblockchain data layer 36. Theprivate blockchain 34 may contain information representing the transaction records 70 associated with the entity's private cryptocoinage 20 (perhaps as one or more privately hashedblocks 180 of data). Theprivate blockchain 34 may also specify, or incorporate, information or data representing thesingle cryptographic address 72. Thesingle cryptographic address 72 may additionally or alternatively be separately sent from theentity server 110 to thedata layer server 112. Regardless, the entity'sprivate cryptocoinage 20 may be associated with thesingle cryptographic address 72. The transaction records 70 and/or the privately hashedblocks 180 of data may thus specify, include, reference, and/or be associated with, and/or identified by, thesingle cryptographic address 72. Because the single cryptographic address 72 (and/or its corresponding hah value) is an identifiable input to thedata layer server 112 generating theblockchain data layer 36, the data records 38 may also carry or reference thesingle cryptographic address 72. So, should theblockchain data layer 36 create or issue itsown cryptocoinage 90, thecryptocoinage 90 may also reference, be identified by, or be associated with thesingle cryptographic address 72. Thesingle cryptographic address 72 is thus a common indicator or reference data for tracking both the entity'sprivate cryptocoinage 20 and thecryptocoinage 90 issued by theblockchain data layer 36. The transaction records 70 (representing entity's private cryptocoinage 20) may thus be commonly mapped or identified to thecryptocoinage 90 issued by theblockchain data layer 36. -
FIG. 18 illustrates a simple illustration. Once the single cryptographic address 72 (and/or its corresponding hash value) is received, thesingle cryptographic address 72 may propagate and be recorded within theblockchain data layer 36. Thesingle cryptographic address 72, for example, may be recorded in any of theentries 160. Theentry 160, and thus thesingle cryptographic address 72, may then be recorded and/or arranged as theentry block 162 and placed within thedirectory block 150. Theentry 160, theentry block 162, and thedirectory block 150 may thus reference, specify, or be associated with, thesingle cryptographic address 72. Thesingle cryptographic address 72 has thus propagated as informational content from theprivate blockchain 34 and into and through theblockchain data layer 36. Thesingle cryptographic address 72 thus hierarchically moves through the multiple layers of cryptographic hashing for public publication. Theblockchain data layer 36 thus tracks the transaction records 70 involving thesingle cryptographic address 72. In simple words, theblockchain data layer 36 may track ownership and transfer of the entity'sprivate cryptocoinage 20 and thecryptocoinage 90 issued by theblockchain data layer 36, all via the commonsingle cryptographic address 72. -
FIG. 19 illustrates more details. While thesingle cryptographic address 72 may be any alphanumeric entry or biometric input,FIG. 19 illustrates acommon authentication mechanism 190. Here the same orsimilar authentication mechanism 190 is used to access both the entity'sprivate cryptocoinage 20 and thecryptocoinage 90 issued by theblockchain data layer 36. If a user of theblockchain data layer 36 satisfies theauthentication mechanism 190, then exemplary embodiments may access both theprivate cryptocoinage 20 and thecryptocoinage 90. As a simple example, suppose the user of theauthentication mechanism 190 supplies information or data representing thesingle cryptographic address 72. Thesingle cryptographic address 72 may be any unique alphanumeric entry, biometric input, user identifier, or other authentication credential. For example, most readers are likely familiar with an alphanumeric username and password, which is acommon authentication mechanism 190.FIG. 19 , though, illustrates a passphrase 192 (such as a multi-word mnemonic). When the entity'sprivate cryptocoinage 20 is/are created, generated, or assigned, the entity'sprivate cryptocoinage 20 may be assigned or associated with thepassphrase 192. Thepassphrase 192 is unique to the registered owner, possessor, or user of the entity'sprivate cryptocoinage 20. Thepassphrase 192 may even be hashed as a hash value and supplied to the blockchain data layer 36 (as above explained). Thepassphrase 192, in other words, may be hashed as thesingle cryptographic address 72 and propagated within theblockchain environment 24 to document the transaction records 70 involving the entity'sprivate cryptocoinage 20. - The
passphrase 192 may also authenticate to thecryptocoinage 90. If the user correctly supplies thepassphrase 192, then the same user may conduct transactions involving thecryptocoinage 90 issued by theblockchain data layer 36. Exemplary embodiments thus allow the user to order transactions and exchanges involving both the entity'sprivate cryptocoinage 20 and thecryptocoinage 90 issued by theblockchain data layer 36. -
FIGS. 20-22 further illustrate the fillingstation 80, according to exemplary embodiments. The fillingstation 80 may be a public and/or private service for financial transactions involving either, or both, of the entity'sprivate cryptocoinage 20 and thecryptocoinage 90 issued by theblockchain data layer 36.FIG. 20 illustrates the fillingstation 80 as a software-as-a-service offered by the securedata layer server 112 for accessing theblockchain data layer 36. The fillingstation 80, for example, may be a module within, or called by, thedata layer application 132. A user accesses the fillingstation 80 to conduct transactions involving her private cryptocoinage 20 (issued by the entity 22) and the cryptocoinage 90 (issued by the blockchain data layer 36). While the fillingstation 80 may have any user interface,FIG. 20 illustrates aweb interface 194. That is, the fillingstation 80 may be accessed via awebpage 196. Thewebpage 196 prompts the user to input her authentication credentials according to the authentication mechanism 190 (such as typing thepassphrase 192 into a data field or audibly speaking the passphrase 192). -
FIG. 22 further illustrates theweb interface 194. The user accesses the fillingstation 80 using auser device 200. While theuser device 200 may be any processor-controlled device, most readers are familiar with asmartphone 202. If thesmartphone 202 correctly sends authentication credentials (such as thesingle cryptographic address 72 and/orpassphrase 192, as above explained), then thesmartphone 202 may utilize theweb interface 194 to thedata layer server 112 and/or theblockchain data layer 36. Thesmartphone 202 executes a web browser and/or a mobile application to send arequest 204 specifying an address or domain name associated with or representing the fillingstation 80. Theweb interface 194 to thedata layer server 112 thus sends thewebpage 196 as a response, and the user'ssmartphone 202 downloads thewebpage 196. Thesmartphone 202 has a processor and memory device that executes (not shown for simplicity) that causes a display of thewebpage 196 as a graphical user interface (or “GUI”) 206 on itsdisplay device 208. TheGUI 206 may generate one or more prompts or fields for specifying theauthentication mechanism 190 and transactional options. For example, the user preferably enters, speaks, or otherwise provides thepassphrase 192. Exemplary embodiments may or may not hash the authentication passphrase (using thehashing algorithm 120 above explained) to produce or generate a hashed passphrase. Exemplary embodiments may then search theblockchain data layer 36 for the data records 38. That is, exemplary embodiments may query theblockchain data layer 36 for a query parameter (such as thesingle cryptographic address 72, thepassphrase 192, and/or their hashed value) and theblockchain data layer 36 identifies the data records 38 that match or reference the query parameter. The fillingstation 80 may then process the data records 38 to provide atransactional summary 210 of theaccount 82, thebalance 84, and any other transactional data. The fillingstation 80 may also allow the user to replenish an amount or value of theprivate cryptocoinage 20 and/or thecryptocoinage 90, even allowing the user to continue exchanging thecryptocoinage 20 for access to theblockchain data layer 36. - Exemplary embodiments may thus share the
common authentication mechanism 190. If the entity'sprivate software application 32 requires thesame passphrase 192 to buy, sell, or otherwise transact theprivate cryptocoinage 20, then thepassphrase 192 may have been hashed (perhaps as the single cryptographic address 72) and recorded within theblockchain data layer 36. Thesingle cryptographic address 72, in other words, may be associated with the data records 38 representing both the private cryptocoinage 20 (issued by the entity 22) and the cryptocoinage 90 (issued by the blockchain data layer 36). The fillingstation 80 may thus identify any of the data records 38 that are commonly associated with thesingle cryptographic address 72, the private cryptocoinage 20 (issued by the entity 22), and/or thecryptocoinage 90. The fillingstation 80 thus allows the user to exchange 20 and 90 for access to thecryptocoinage private blockchain 34 and/or theblockchain data layer 36. -
FIG. 22 illustrates a query mechanism. Here thedata layer server 112 may access adatabase 220 of data layer records. Thedatabase 220 of data layer records provides a referential record of the informational content contained within theblockchain data layer 36.FIG. 22 illustrates thedata layer server 112 locally storing thedatabase 220 of data layer records in itslocal memory device 134, but thedatabase 220 of data layer records may be remotely stored and accessed via thecommunications network 114. Regardless, thedata layer server 112 may query thedatabase 220 of data layer records for thesingle cryptographic address 72 and identify and/or retrieve any corresponding data records 38. While thedatabase 220 of data layer records may have any logical structure,FIG. 22 illustrates thedatabase 220 of data layer records as a table 222 that maps, converts, or translates thesingle cryptographic address 72 to itscorresponding entry 160,entry block 162, and/or directory block 150 within theblockchain data layer 36. Whenever thedata layer server 112 generates theentry 160,entry block 162, and/or directory block 150 using thesingle cryptographic address 72, thedata layer server 112 may add an entry to thedatabase 220 of data layer records. Over time, then, thedatabase 220 of data layer tracks a comprehensive historical repository of information that is electronically associated with its correspondingsingle cryptographic address 72. Thedata layer server 112 may then read or retrieve theentry 160,entry block 162, and/or directory block 150 containing or corresponding to thesingle cryptographic address 72. - Exemplary embodiments thus present the entity-
specific cryptocoinage 20. Anyentity 22 may create its ownprivate blockchain 34 and establish its entity-specific tokens 26. The entity-specific tokens 26 may or may not have thevalue 64. Thetradeable token 52, for example, may have a market value based on supply and/or demand, thus allowing or causing thevalue 64 of thetradeable token 52 to rise/fall or to increase/decrease, based on market forces. Thecredit token 50, however, may have a constant price or value, perhaps set by theentity 22. The entity-specific tokens 26 may be associated with the same sharedsingle cryptographic address 72, thus allowing a faster and simpler accounting scheme for each user and/oraccount 82. - Exemplary embodiments thus create coinage on top of coinage. The hierarchical scheme (explained with reference to
FIG. 16 ) allows theprivate entity 22 to establish itsprivate cryptocoinage 20 hierarchically above the traditional BITCOIN®, ETHEREUM®, or RIPPLE® coinage. The entity'sprivate data 30 remains private, but the transaction records 70 may be publically documented or proved via the traditional BITCOIN®, ETHEREUM®, or RIPPLE® environment. Theprivate entity 22, in other words, need to worry about or concern itself with public publication. Theprivate entity 22 need only subscribe (e.g., pay for write access) to theblockchain data layer 36. -
FIG. 23 illustrates apublic entity 230, according to exemplary embodiments. Here exemplary embodiments may be applied topublic data 232 generated by thepublic entity 230. Thepublic entity 230 may be a city, state, or federal governmental agency, but thepublic entity 230 may also be a contractor, non-governmental organization, or other actor that acts on behalf of the governmental agency. Thepublic entity 230 operates apublic server 234 and applies itssoftware application 236 to itspublic data 232 to generate itsgovernmental blockchain 238. Thepublic entity 230 may further generate/issue itscryptocoinage 240. Thedata layer server 112 receives thegovernmental blockchain 238 and generates theblockchain data layer 36. Thedata layer server 112 may then generate thepublic blockchain 40 representing anydata records 38 representing thepublic data 232 and/or thecryptocoinage 240. -
FIG. 24 is a flowchart illustrating a method or algorithm for the private, entity basedcryptocoinage 20, according to exemplary embodiments. The electronicprivate data 30 representing theprivate cryptocoinage 20 is generated (Block 300), hashed (Block 302), and incorporated into the private blockchain 34 (Block 304). Theprivate blockchain 34 is received by the data layer server 112 (Block 306) and the data records 38 in theblockchain data layer 36 are generated (Block 308). The data records 38 in theblockchain data layer 36 may be hashed (Block 310) and incorporated into the public blockchain 34 (Block 312). When a user successfully authenticates to the filling station 80 (Block 314), the fillingstation 80 may access the data records 38 in the blockchain data layer 36 (Block 316) representing theprivate cryptocoinage 20. -
FIG. 25 is a schematic illustrating still more exemplary embodiments.FIG. 25 is a more detailed diagram illustrating a processor-controlleddevice 350. As earlier paragraphs explained, the entity'sprivate software application 32 and/or thedata layer application 132 may partially or entirely operate in any mobile or stationary processor-controlled device.FIG. 25 , then, illustrates the entity'sprivate software application 32 and/or thedata layer application 132 stored in a memory subsystem of the processor-controlleddevice 350. One or more processors communicate with the memory subsystem and execute either, some, or all applications. Because the processor-controlleddevice 350 is well known to those of ordinary skill in the art, no further explanation is needed. -
FIG. 26 depicts other possible operating environments for additional aspects of the exemplary embodiments.FIG. 26 illustrates the entity'sprivate software application 32 and/or thedata layer application 132 operating within various other processor-controlleddevices 350.FIG. 26 , for example, illustrates that the entity'sprivate software application 32 and/or thedata layer application 132 may entirely or partially operate within a set-top box (“STB”) (352), a personal/digital video recorder (PVR/DVR) 354, a Global Positioning System (GPS)device 356, aninteractive television 358, atablet computer 360, or any computer system, communications device, or processor-controlled device utilizing any of the processors above described and/or a digital signal processor (DP/DSP) 362. Moreover, the processor-controlleddevice 350 may also include wearable devices (such as watches), radios, vehicle electronics, clocks, printers, gateways, mobile/implantable medical devices, and other apparatuses and systems. Because the architecture and operating principles of thevarious devices 350 are well known, the hardware and software componentry of thevarious devices 350 are not further shown and described. - Exemplary embodiments may be applied to any signaling standard. Most readers are thought familiar with the Global System for Mobile (GSM) communications signaling standard. Those of ordinary skill in the art, however, also recognize that exemplary embodiments are equally applicable to any communications device utilizing the Time Division Multiple Access signaling standard, the Code Division Multiple Access signaling standard, the “dual-mode” GSM-ANSI Interoperability Team (GAIT) signaling standard, or any variant of the GSM/CDMA/TDMA signaling standard. Exemplary embodiments may also be applied to other standards, such as the I.E.E.E. 802 family of standards, the Industrial, Scientific, and Medical band of the electromagnetic spectrum, BLUETOOTH®, and any other.
- Exemplary embodiments may be physically embodied on or in a computer-readable storage medium. This computer-readable medium, for example, may include CD-ROM, DVD, tape, cassette, floppy disk, optical disk, memory card, memory drive, and large-capacity disks. This computer-readable medium, or media, could be distributed to end-subscribers, licensees, and assignees. A computer program product comprises processor-executable instructions for establishing the entity-specific
private cryptocoinage 20, as the above paragraphs explain. - While the exemplary embodiments have been described with respect to various features, aspects, and embodiments, those skilled and unskilled in the art will recognize the exemplary embodiments are not so limited. Other variations, modifications, and alternative embodiments may be made without departing from the spirit and scope of the exemplary embodiments.
Claims (20)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/983,572 US20190354606A1 (en) | 2018-05-18 | 2018-05-18 | Private Cryptocoinage in Blockchain Environments |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/983,572 US20190354606A1 (en) | 2018-05-18 | 2018-05-18 | Private Cryptocoinage in Blockchain Environments |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20190354606A1 true US20190354606A1 (en) | 2019-11-21 |
Family
ID=68534522
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/983,572 Abandoned US20190354606A1 (en) | 2018-05-18 | 2018-05-18 | Private Cryptocoinage in Blockchain Environments |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US20190354606A1 (en) |
Cited By (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111078797A (en) * | 2019-12-26 | 2020-04-28 | 卓尔智联(武汉)研究院有限公司 | Token distribution method, device, computer equipment and storage medium |
| US10693652B2 (en) | 2017-04-27 | 2020-06-23 | Factom, Inc. | Secret sharing via blockchain distribution |
| US20200202035A1 (en) * | 2018-12-19 | 2020-06-25 | Alibaba Group Holding Limited | Data isolation in a blockchain network |
| US20200252224A1 (en) * | 2019-02-01 | 2020-08-06 | Innovation Finance Usa Llc | System for secure accelerated resource allocation |
| US10783164B2 (en) | 2018-05-18 | 2020-09-22 | Factom, Inc. | Import and export in blockchain environments |
| US10817873B2 (en) | 2017-03-22 | 2020-10-27 | Factom, Inc. | Auditing of electronic documents |
| CN112700314A (en) * | 2020-12-21 | 2021-04-23 | 布比(北京)网络技术有限公司 | Auction method and system based on mixed block chain |
| US11170366B2 (en) | 2018-05-18 | 2021-11-09 | Inveniam Capital Partners, Inc. | Private blockchain services |
| US11176273B2 (en) * | 2019-05-03 | 2021-11-16 | International Business Machines Corporation | Privacy-preserving anomalous behavior detection |
| US11276056B2 (en) | 2018-08-06 | 2022-03-15 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11296889B2 (en) | 2017-02-17 | 2022-04-05 | Inveniam Capital Partners, Inc. | Secret sharing via blockchains |
| US11328290B2 (en) | 2018-08-06 | 2022-05-10 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
| US11343075B2 (en) | 2020-01-17 | 2022-05-24 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
| US20220270150A1 (en) * | 2021-02-25 | 2022-08-25 | Mythical, Inc. | Systems and methods to support custom bundling of virtual items within an online game |
| US11443371B2 (en) | 2017-03-31 | 2022-09-13 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
| US11477271B2 (en) | 2018-05-18 | 2022-10-18 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
| US20230068301A1 (en) * | 2021-08-26 | 2023-03-02 | Mastercard International Incorporated | Method and system for privately managed digital assets on an enterprise blockchain |
| US20230362167A1 (en) * | 2022-05-03 | 2023-11-09 | Capital One Services, Llc | System and method for enabling multiple auxiliary use of an access token of a user by another entity to facilitate an action of the user |
| US11863686B2 (en) | 2017-01-30 | 2024-01-02 | Inveniam Capital Partners, Inc. | Validating authenticity of electronic documents shared via computer networks |
| US11989208B2 (en) | 2018-08-06 | 2024-05-21 | Inveniam Capital Partners, Inc. | Transactional sharding of blockchain transactions |
| US12007972B2 (en) | 2021-06-19 | 2024-06-11 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
| US12008526B2 (en) | 2021-03-26 | 2024-06-11 | Inveniam Capital Partners, Inc. | Computer system and method for programmatic collateralization services |
| US12093856B2 (en) | 2021-03-25 | 2024-09-17 | Innovation Finance Usa Llc | System for secure automated and accelerated resource allocation |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| US12137179B2 (en) | 2021-06-19 | 2024-11-05 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
| US12231566B2 (en) | 2017-09-13 | 2025-02-18 | Inveniam Capital Partners, Inc. | Apparatus and methods for producing data structures having internal self-references suitable for immutably representing and verifying data |
Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150206106A1 (en) * | 2014-01-13 | 2015-07-23 | Yaron Edan Yago | Method for creating, issuing and redeeming payment assured contracts based on mathemematically and objectively verifiable criteria |
| US20150379484A1 (en) * | 2014-06-25 | 2015-12-31 | Fexco | International payment systems and methods |
| US9378343B1 (en) * | 2006-06-16 | 2016-06-28 | Nokia Corporation | Automatic detection of required network key type |
| US20160371771A1 (en) * | 2015-06-16 | 2016-12-22 | BitPagos, Inc. | Loan processing service utilizing a distributed ledger digital asset |
| US20170178237A1 (en) * | 2014-03-11 | 2017-06-22 | Dragonfly Fintech Pte Ltd | Computer implemented frameworks and methods configured to create and manage a virtual currency |
| US20170221052A1 (en) * | 2015-07-14 | 2017-08-03 | Fmr Llc | Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems |
| US20170228731A1 (en) * | 2016-02-09 | 2017-08-10 | Fmr Llc | Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems |
| US20180101842A1 (en) * | 2016-10-10 | 2018-04-12 | AlphaPoint | User account management via a distributed ledger |
| US20180189781A1 (en) * | 2017-01-05 | 2018-07-05 | The Toronto-Dominion Bank | Real-time approval and execution of data exchanges between computing systems |
| US20180268382A1 (en) * | 2017-03-20 | 2018-09-20 | Steven Victor Wasserman | Blockchain digital currency: systems and methods for use in enterprise blockchain banking |
| US10102265B1 (en) * | 2017-04-12 | 2018-10-16 | Vijay K. Madisetti | Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing |
| US20190065709A1 (en) * | 2017-08-24 | 2019-02-28 | Oracle International Corporation | Digital asset traceability and assurance using a distributed ledger |
| US20190188699A1 (en) * | 2017-12-15 | 2019-06-20 | Fmr Llc | Social Data Tracking Datastructures, Apparatuses, Methods and Systems |
-
2018
- 2018-05-18 US US15/983,572 patent/US20190354606A1/en not_active Abandoned
Patent Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9378343B1 (en) * | 2006-06-16 | 2016-06-28 | Nokia Corporation | Automatic detection of required network key type |
| US20150206106A1 (en) * | 2014-01-13 | 2015-07-23 | Yaron Edan Yago | Method for creating, issuing and redeeming payment assured contracts based on mathemematically and objectively verifiable criteria |
| US20170178237A1 (en) * | 2014-03-11 | 2017-06-22 | Dragonfly Fintech Pte Ltd | Computer implemented frameworks and methods configured to create and manage a virtual currency |
| US20150379484A1 (en) * | 2014-06-25 | 2015-12-31 | Fexco | International payment systems and methods |
| US20160371771A1 (en) * | 2015-06-16 | 2016-12-22 | BitPagos, Inc. | Loan processing service utilizing a distributed ledger digital asset |
| US20170221052A1 (en) * | 2015-07-14 | 2017-08-03 | Fmr Llc | Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems |
| US20170228731A1 (en) * | 2016-02-09 | 2017-08-10 | Fmr Llc | Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems |
| US20180101842A1 (en) * | 2016-10-10 | 2018-04-12 | AlphaPoint | User account management via a distributed ledger |
| US20180189781A1 (en) * | 2017-01-05 | 2018-07-05 | The Toronto-Dominion Bank | Real-time approval and execution of data exchanges between computing systems |
| US20180268382A1 (en) * | 2017-03-20 | 2018-09-20 | Steven Victor Wasserman | Blockchain digital currency: systems and methods for use in enterprise blockchain banking |
| US10102265B1 (en) * | 2017-04-12 | 2018-10-16 | Vijay K. Madisetti | Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing |
| US20190065709A1 (en) * | 2017-08-24 | 2019-02-28 | Oracle International Corporation | Digital asset traceability and assurance using a distributed ledger |
| US20190188699A1 (en) * | 2017-12-15 | 2019-06-20 | Fmr Llc | Social Data Tracking Datastructures, Apparatuses, Methods and Systems |
Cited By (59)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11863686B2 (en) | 2017-01-30 | 2024-01-02 | Inveniam Capital Partners, Inc. | Validating authenticity of electronic documents shared via computer networks |
| US12341906B2 (en) | 2017-01-30 | 2025-06-24 | Inveniam Capital Partners, Inc. | Validating authenticity of electronic documents shared via computer networks |
| US11296889B2 (en) | 2017-02-17 | 2022-04-05 | Inveniam Capital Partners, Inc. | Secret sharing via blockchains |
| US10817873B2 (en) | 2017-03-22 | 2020-10-27 | Factom, Inc. | Auditing of electronic documents |
| US11580534B2 (en) | 2017-03-22 | 2023-02-14 | Inveniam Capital Partners, Inc. | Auditing of electronic documents |
| US11443371B2 (en) | 2017-03-31 | 2022-09-13 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
| US11443370B2 (en) | 2017-03-31 | 2022-09-13 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
| US11468510B2 (en) | 2017-03-31 | 2022-10-11 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
| US12192371B2 (en) | 2017-04-27 | 2025-01-07 | Inveniam Capital Partners, Inc. | Artificial intelligence modifying federated learning models |
| US11044097B2 (en) | 2017-04-27 | 2021-06-22 | Factom, Inc. | Blockchain recordation of device usage |
| US10693652B2 (en) | 2017-04-27 | 2020-06-23 | Factom, Inc. | Secret sharing via blockchain distribution |
| US12231566B2 (en) | 2017-09-13 | 2025-02-18 | Inveniam Capital Partners, Inc. | Apparatus and methods for producing data structures having internal self-references suitable for immutably representing and verifying data |
| US12118541B2 (en) | 2018-05-18 | 2024-10-15 | Inveniam Capital Partners, Inc. | Recordation of device usage to blockchains |
| US11587074B2 (en) | 2018-05-18 | 2023-02-21 | Inveniam Capital Partners, Inc. | Recordation of device usage to blockchains |
| US11170366B2 (en) | 2018-05-18 | 2021-11-09 | Inveniam Capital Partners, Inc. | Private blockchain services |
| US11930072B2 (en) | 2018-05-18 | 2024-03-12 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
| US11580535B2 (en) | 2018-05-18 | 2023-02-14 | Inveniam Capital Partners, Inc. | Recordation of device usage to public/private blockchains |
| US11477271B2 (en) | 2018-05-18 | 2022-10-18 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
| US12008015B2 (en) | 2018-05-18 | 2024-06-11 | Inveniam Capital Partners, Inc. | Import and export in blockchain environments |
| US11347769B2 (en) | 2018-05-18 | 2022-05-31 | Inveniam Capital Partners, Inc. | Import and export in blockchain environments |
| US10783164B2 (en) | 2018-05-18 | 2020-09-22 | Factom, Inc. | Import and export in blockchain environments |
| US11276056B2 (en) | 2018-08-06 | 2022-03-15 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11587069B2 (en) | 2018-08-06 | 2023-02-21 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11620642B2 (en) | 2018-08-06 | 2023-04-04 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11348097B2 (en) | 2018-08-06 | 2022-05-31 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11615398B2 (en) | 2018-08-06 | 2023-03-28 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11334874B2 (en) | 2018-08-06 | 2022-05-17 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11531981B2 (en) | 2018-08-06 | 2022-12-20 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11328290B2 (en) | 2018-08-06 | 2022-05-10 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
| US11295296B2 (en) | 2018-08-06 | 2022-04-05 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
| US11989208B2 (en) | 2018-08-06 | 2024-05-21 | Inveniam Capital Partners, Inc. | Transactional sharding of blockchain transactions |
| US11676132B2 (en) | 2018-08-06 | 2023-06-13 | Inveniam Capital Partners, Inc. | Smart contracts in blockchain environments |
| US11687916B2 (en) | 2018-08-06 | 2023-06-27 | Inveniam Capital Partners, Inc. | Decisional architectures in blockchain environments |
| US11106817B2 (en) | 2018-12-19 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Data isolation in a blockchain network |
| US11074358B2 (en) * | 2018-12-19 | 2021-07-27 | Advanced New Technologies Co., Ltd. | Data isolation in a blockchain network |
| US20200202035A1 (en) * | 2018-12-19 | 2020-06-25 | Alibaba Group Holding Limited | Data isolation in a blockchain network |
| US11044106B2 (en) | 2019-02-01 | 2021-06-22 | Innovation Finance Usa Llc | System for secure accelerated resource allocation |
| US11595219B2 (en) | 2019-02-01 | 2023-02-28 | Innovation Finance Usa Llc | System for secure accelerated resource allocation |
| US20200252224A1 (en) * | 2019-02-01 | 2020-08-06 | Innovation Finance Usa Llc | System for secure accelerated resource allocation |
| US11176273B2 (en) * | 2019-05-03 | 2021-11-16 | International Business Machines Corporation | Privacy-preserving anomalous behavior detection |
| CN111078797A (en) * | 2019-12-26 | 2020-04-28 | 卓尔智联(武汉)研究院有限公司 | Token distribution method, device, computer equipment and storage medium |
| US11444749B2 (en) | 2020-01-17 | 2022-09-13 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
| US11863305B2 (en) | 2020-01-17 | 2024-01-02 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
| US11943334B2 (en) | 2020-01-17 | 2024-03-26 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
| US11343075B2 (en) | 2020-01-17 | 2022-05-24 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
| US12231535B2 (en) | 2020-01-17 | 2025-02-18 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
| US12225107B2 (en) | 2020-01-17 | 2025-02-11 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| CN112700314A (en) * | 2020-12-21 | 2021-04-23 | 布比(北京)网络技术有限公司 | Auction method and system based on mixed block chain |
| US20220270150A1 (en) * | 2021-02-25 | 2022-08-25 | Mythical, Inc. | Systems and methods to support custom bundling of virtual items within an online game |
| US12165187B2 (en) * | 2021-02-25 | 2024-12-10 | Mythical, Inc. | Systems and methods to support custom bundling of virtual items within an online game |
| US12093856B2 (en) | 2021-03-25 | 2024-09-17 | Innovation Finance Usa Llc | System for secure automated and accelerated resource allocation |
| US12008526B2 (en) | 2021-03-26 | 2024-06-11 | Inveniam Capital Partners, Inc. | Computer system and method for programmatic collateralization services |
| US12137179B2 (en) | 2021-06-19 | 2024-11-05 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
| US12007972B2 (en) | 2021-06-19 | 2024-06-11 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
| US20230068301A1 (en) * | 2021-08-26 | 2023-03-02 | Mastercard International Incorporated | Method and system for privately managed digital assets on an enterprise blockchain |
| US12243051B2 (en) * | 2021-08-26 | 2025-03-04 | Mastercard International Incorporated | Method and system for privately managed digital assets on an enterprise blockchain |
| US12301575B2 (en) * | 2022-05-03 | 2025-05-13 | Capital One Services, Llc | System and method for enabling multiple auxiliary use of an access token of a user by another entity to facilitate an action of the user |
| US20230362167A1 (en) * | 2022-05-03 | 2023-11-09 | Capital One Services, Llc | System and method for enabling multiple auxiliary use of an access token of a user by another entity to facilitate an action of the user |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11531981B2 (en) | Digital contracts in blockchain environments | |
| US20190354606A1 (en) | Private Cryptocoinage in Blockchain Environments | |
| US12008015B2 (en) | Import and export in blockchain environments | |
| US20210273810A1 (en) | Debt Recordation to Blockchains | |
| US20200005290A1 (en) | System and Method for Processing Payments in Fiat Currency Using Blockchain and Tethered Tokens | |
| US20190356733A1 (en) | Load Balancing in Blockchain Environments | |
| EP3520319A1 (en) | Distributed electronic record and transaction history | |
| WO2020248079A1 (en) | Secure information storage, transfer and computing | |
| JP2025510779A (en) | A unified platform for digital asset registration, tracking and authentication | |
| EP4540957A1 (en) | Systems and methods for mitigating network congestion on blockchain networks by supporting blockchain operations through off-chain interactions |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: FACTOM, INC., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SNOW, PAUL;REEL/FRAME:047604/0238 Effective date: 20181113 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| AS | Assignment |
Owner name: INVENIAM CAPITAL PARTNERS, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FACTOM, INC.;REEL/FRAME:056691/0964 Effective date: 20210604 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
| AS | Assignment |
Owner name: 1221 INVENIAM LLC, FLORIDA Free format text: SECURITY INTEREST;ASSIGNOR:INVENIAM CAPITAL PARTNERS, INC.;REEL/FRAME:067932/0074 Effective date: 20231020 |
|
| AS | Assignment |
Owner name: 1221 INVENIAM II LLC, FLORIDA Free format text: AMENDMENT AND JOINDER TO SECURITY AGREEMENT;ASSIGNOR:INVENIAM CAPITAL PARTNERS INC;REEL/FRAME:070741/0157 Effective date: 20231115 Owner name: 1221 INVENIAM LLC, FLORIDA Free format text: AMENDMENT AND JOINDER TO SECURITY AGREEMENT;ASSIGNOR:INVENIAM CAPITAL PARTNERS INC;REEL/FRAME:070741/0157 Effective date: 20231115 |